article thumbnail

Top Open Source Security Tools

eSecurity Planet

Backed by a huge open source database of known exploits, it also provides IT with an analysis of pen testing results so remediation steps can be done efficiently. Read more: Metasploit: Pen Testing Product Overview and Analysis. Read more: Fiddler: Pen Testing Product Overview and Analysis. Security Onion. Aircrack-ng.

Security 132
article thumbnail

Recap of the OCR/NIST Conference on Safeguarding Health Information

HL Chronicle of Data Protection

Serena Mosely-Day, Acting Senior Advisor for Compliance and Enforcement at OCR, discussed enforcement trends and noted that the same issues tend to appear repeatedly including: (i) incomplete or improper risk analysis; (ii) failure to manage identified risk (e.g., The following themes emerged: Potential Changes to HIPAA Rules.

Risk 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

Cyber criminals may damage, destroy, steal, encrypt, expose, or leak data as well as cause harm to a system. Encrypted threats spiked 167%, ransomware increased 105%, and 5.4 In May, cybersecurity researchers revealed that ransomware attacks are increasing their aggressive approach by destroying data instead of encrypting it.

article thumbnail

QakBot Big Game Hunting continues: the operators drop ProLock ransomware for Egregor

Security Affairs

The analysis of attacks where Egregor has been deployed revealed that the TTPs used by the threat actors are almost identical to the ones used by the ProLock operators, whose campaigns have been described in Group-IB blog post in May. Egregor operators use the combination of ChaCha8 stream cipher and RSA-2048 for file encryption.

article thumbnail

SmugX: Chinese APT uses HTML smuggling to target European Ministries and embassies

Security Affairs

The analysis of the documents employed in the campaign that were uploaded to VirusTotal reveals that they the Chinese APT group attempted to target diplomats and government entities in Czechia, Hungary, Slovakia, the U.K., An invitation to a diplomatic conference issued by Hungary’s Ministry of Foreign Affairs. and Ukraine.

article thumbnail

Centre Reports on 36th International Conference of Data Protection and Privacy Commissioners

Hunton Privacy

The closed session featured a discussion on the benefits and risks of the Internet of Things among four experts from academia and the private sector and the Conference member authorities. Conference members called on big data users to take a number of actions, including the following: Respect the principle of purpose specification.

Privacy 40
article thumbnail

[Full-Disclosure] HideezKey 2 FAIL: How a good idea turns into a SPF (Security Product Failure)

Security Affairs

This will help me later in the case I will be able to obtain a firmware that eventually is encrypted (i.e. Firmware Analysis: Passed the initial shock, I thought the data inside the dump would have been still encrypted in some way. With of course, an active anti-tamper detection mechanism that will void the encrypted content.

Security 101